On the Local Approximations of Node Centrality in Internet Router-level Topologies

Size: px
Start display at page:

Download "On the Local Approximations of Node Centrality in Internet Router-level Topologies"

Transcription

1 On the Local Approximations of Node Centrality in Internet Router-level Topologies Technical Report Panagiotis Pantazopoulos Merkourios Karaliopoulos and Ioannis Stavrakakis Department of Informatics and Telecommunications, University of Athens, Ilissia, Athens, Greece {ppantaz, mkaralio, Abstract In many networks with distributed operation and self-organization features, acquiring their global topological information is impractical, if feasible at all. Internet protocols drawing on node centrality indices may instead approximate them with their egocentric counterparts, computed out over the nodes ego-networks. Surprisingly, however, in router-level topologies the approximative power of localized ego-centered measurements has not been systematically evaluated. More importantly, it is unclear how to practically interpret any positive correlation found between the two centrality metric variants. The paper addresses both issues using different datasets of ISP network topologies. We first assess how well the egocentric metrics approximate the original sociocentric ones, determined under perfect network-wide information. To this end we use two measures: their rank-correlation and the overlap in the top-k node lists the two centrality metrics induce. Overall, the rank-correlation is high, in the order of.8-.9, and, intuitively, becomes higher as we relax the ego-network definition to include the ego s r-hop neighborhood. On the other hand, the top-k node overlap is low, suggesting that the high rank-correlation is mainly due to nodes of lower rank. We then let the node centrality metrics drive elementary network operations, such as local search strategies. Our results suggest that, even under high rank-correlation, the locally-determined metrics can hardly be effective aliases for the global ones. The implication for protocol designers is that rank-correlation is a poor indicator for the approximability of centrality metrics. I. INTRODUCTION Computer networks constitute a paradigm of a complex system, where complexity may arise due to the topological structure and node diversity or dynamical evolution processes. Understanding the behavior of networked interacting elements based on the measured statistical or local structural properties of given nodes, is the main focus of the highly interdisciplinary emerging framework of Social Network Analysis (SNA) [1]. Expectations within the networking community are that social insights could assist simplifying networking complexity and benefit the design of efficient protocols. Indeed, they have been shown to improve network functions such as routing decisions in opportunistic networks [2] [3], or content-caching strategies in wired networks [4]. Commondenominatorto all these effortsis the use of SNAdriven metrics for assessing the centrality, i.e., significance, This work has been supported by EINS, the Network of Excellence in Internet Science through EC s Grant Agreement FP7-ICT of individual network nodes, whether humans or servers. The computation of these metrics, however, typically demands global information about all network nodes and their interconnections. The distribution and maintenance of this information is problematic in large-scale networks. In certain environments it may not even be an option at all, as for example in the emerging self-organizing networks that lack centralized network management. A more realistic alternative for assessing node centrality may be based on its ego network (SNA term) or centered graph (graph-theoretic term) [5], i.e., the subgraph involving itself, its 1-hop neighbors, and their interconnections. Nodes can acquire a local approximation of their centrality through egocentric measurements within their immediate locality; the centrality (DC) serves as the simplest estimate of that kind. Computing egocentric 1 metrics is apparently of low complexity and, in fact, part of protocol implementations [2], [4]. Nevertheless, the capacity of these local approximations to substitute the globally computed sociocentric metrics is almost always taken for granted rather than evaluated. In physical topologies, it is the DC that is typically considered as the proper alias for the global centrality values [6], [7]. Over Internet router-level topologies, in particular, a systematic study of the effectiveness of local approximations is yet to come. On the one hand, it is this thread that our paper addresses; on the other, we seek to assess whether the typical finding of works on locally-determined approximations i.e., the high positive correlation with the global metric, practically favors the effectiveness of network functions that rely on it. We focus on node centrality metrics, which are the most commonly used in networking protocols. Besides the well known Betweenness Centrality (BC) metric, we study Conditional BC (CBC), an already introduced BC variant [8] particularly suited to networks with many-to-one data flow typologies. As in several cases it is the order of the metric values that matters rather than their absolute values, we first compare the sociocentric metrics, computed under global topological information, against their egocentric counterparts, computed locally over the nodes ego networks, in terms of 1 The terms egocentric and localized as well as sociocentric and global will be considered as synonyms and used interchangeably.

2 2 correlation-operations; namely the overlap of the k nodes exhibiting the top values of the considered counterparts and foremost, their corresponding rank-correlation. Then, contrary to previous works, we proceed to study whether a number of basic network functions as well as protocols, rely their effectiveness on rank-preserving localized centrality metrics. A. Related work Computing centrality values typically requires global topological information. BC computations in particular, can be accordingly carried out by exact [9] or approximation algorithms [1], [11]. The former explores the network using wellknown algorithms (i.e., BFS, Dijkstra) and then effectively aggregates the discovered paths circumventing the high complexity of the involved all-pairs shortest path problem; the later seek to provide accurate sampling methods that approximate the BC of each node based on number of the (single source) shortest paths originating from certain reference nodes or even restrict the considered node pairs to those that lie at most k hops away from each other [12]. On the contrary methods that rely on locally available information are increasingly sought for as they are better suited, if not the only alternative, to facilitate networking protocol operations; in light of the autonomic networking environments, the availability of networkwide 2 topological information is deemed non-realistic. Moreover, recent distributed-fashion approaches that leverage random walk strategies to reveal high BC [13],[14]or centralnodesin a moregeneralsense [15],do not qualify for the task as they require information gathering from the whole or part of the network topology, respectively. Consequently, research efforts (in various disciplines) seek to devise localized counterparts of the global centrality metrics and study whether and how well do the former correlate with the latter. From a networking standpoint, localized counterparts have been proposed for the bridging [16] and closeness centrality [17]. In the first case the global BC factor of the original bridging centrality definition is replaced with the egocentric BC metric. In the second, the authors argue that the number of edges present in a small network neighborhood around a given node, accurately reflects its closeness to the rest of the network nodes provided that the considered network exhibits relatively small radius. Both works promote the high positive rank-correlation scores between the local and global counterpart over synthetic and real world networks (including router-level topologies for the second work), as evidence for the effective approximation of the latter but do not explore whether this is sufficient to drive networking operations. Regarding BC, its localized approximation over real-world network topologies is typically provided by the node. This is based on the grounds of the observed linear behavior between the mean BC metric and the node [6]. The authors analyze the probability distribution of various quantities including betweenness centrality for different time snapshots 2 The hierarchical structure of the Internet topologies prevents even a link state protocol from providing information of that scope. of Internet maps. They observe that these distributions are characterized by scaling exponents stationary in time. Moreover, they argue that the nontrivial betweenness and correlation is due to the Internet hierarchical structure. However, note that these studies involve AS-level Internet maps that can exhibit different connectivity properties compared to the router-level topologies. Similar power-law behavior has been reported by Goh et al. [18] for the load distribution (which is only a betweenness centrality approximation) in synthetic scale-free networks The network s distribution follows a power law p(k) k γ where γ [2, ) while the load l has been shown to be distributed according to P(l) l δ with exponent δ. Based on numerical results, the authors have conjectured that the value of δ 2.2 is independent of γ for the interval (2, 3] suggesting a universal behavior for the load quantity in scale-free networks. Finally, a number of social studies provide experimental evidence for positive correlation between sociocentric and egocentric BC over small social and synthetic networks [19], [2]. In [19], the evaluation includes social networks of sizes up to 217 nodes and in all cases high Pearson s correlation values are reported. The deviation of different nodes from the respective regression line is explained on the basis of their hub/bridging functionality within the network. In [2] similar positive conclusions are drawn for synthetic random graphs RG(N, p) of size N [25, 5] and edge occurrence probability p [.1,.6]. The authors observe stronger correlation when the network nodes have either very similar or very differentiated sociocentric BC scores. B. Our contribution To exploit available information in a wider locality, we compute the egocentric betweenness variants over a generalized 2-hops ego network and analyze the corresponding time complexity and message overhead(section II). Then we report onthebcvs. egobc,bcvs. DC,CBCvs. egocbcmatching in terms of correlation-operations; we draw insights from synthetic topologies and then focus on (22 different ISPs ) router-level topologies of sizes up to 8K nodes (Section III). Our synthetic networks yield significant rank-correlation that weakens as their size increases. In router-level topologies we measure high rank correlation (.8-.9) in almost all cases and even higher when the 2-hop neighbors are considered. On the contrary, the top-k overlap is found low prompting us to study whether the rank-preserving local metrics can in practice substitute the global ones. Our experiments with basic network functions such as the centrality-driven content search, show (Section IV) that high rank-correlation values between the centrality counterparts can hardly suggest the effectiveness of network functions utilizing the rank-preserving local counterparts. II. SOCIOCENTRIC vs. EGOCENTRIC CENTRALITY METRICS The sociocentric metrics of betweenness centrality (BC) and the conditional betweenness centrality (CBC), along with

3 3 a. Ego network of node u (r = 1). b. Ego network of node u (r = 2) Fig. 1. a) Nodes 2, 3 and 4 contribute to egocbc(u; 11, 1) = 2 with contributions 1/2, 1/2 and 1, respectively. b) Node 8 reaches the exit node 1 for destination node 11 through five different paths, two of which pass through node u, thus contributing 2/5 to egocbc(u; 11, 2). their egocentric counterparts 3 are first presented. Then, the complexity savings achieved by the latter, are discussed. A. Globally computed centrality indices Consider an arbitrary node pair (s, t) over a connected undirected graph G = (V, E). If σ st is the number of shortest paths between s and t and σ st (u) those of them passing throughnode u t, thenthebetweennesscentralityofnode u, equals BC(u) = s,t V s<t σ st(u) σ st. Effectively, BC(u) assesses the importance of a network node for serving information that flows over shortest paths in the network [21]. Whereas BC(u) is an average over all network node pairs, the conditional betweenness centrality index (CBC), captures the topological centrality of node u t with respect to a specific destination node t [22] and is given by: CBC(u; t) = s V s t σ st(u) σ st, with σ st (s) =. Therefore, CBC is particularly suited to settings where information is directed towards a particular node with discrete network functionality. B. Locally computed centrality metrics - ego networks Computing the above metrics requires information about the whole network topology and implies computational and message load overheads. In distributed settings, where nodes may be energy constrained or no explicit centralized network management be available, these computations are not favorable or not an option at all. Instead, techniques for locally assessing the centrality of network nodes can be borrowed from the SNA concepts. In the so-called ego-network structure of social studies the person we are interested in is referred to as the ego and its ego-network comprises itself together with those having an affiliation or friendship with it, known as alters. Alters may as well share relations with each other (Fig. 1.a). Hereafter, we generalize the ego-network definition to include nodes (alters) lying r hops away from u and the edges (links) between them. Formally, we can define the r th -order ego network as follows. Let N u r be the set of nodes that form the r-hop neigborhood around u, i.e., N u r = {n G : 1 3 The centrality (DC) is by default an egocentric centrality metric. h(n, u) r}, where h(a, b) denotes the minimum hopcount betweennodes aand b.the r th -orderegonetworkofnode uis the graph G u r = (Vr u, Er u ), where the set of nodes and edges are Vr u = Nr u {u} and Er u = {(i, j) E : i, j Vr u }, respectively. For r = 1 the network G u 1 corresponds to the original ego network definition and consists of V1 u = DC(u) + 1 nodes and E1 u (DC(u) ) = DC(u) + CC(u) 2 edges, where CC(u) is the clustering coefficient[23] of node u and DC(u) its centrality. Practically, values of r > 2 would tend to cancel the advantages that local ego-centered measurements induce. Accordingly, BC metrics of a certain node can be defined with respect to its ego network. For the egocentrically measured betweenness centrality (egobc) of node u, it suffices to apply the typical BC formula over the graph G u r : egobc(u; r) = BC(u) V =V u r. Fig. 2. Toy-example computation: egobc(u; 1)= 1(1 6 1 ) [2(1 1 2 ) + 2(1 1 3 )] = 5 3 We further detail the computation formula of egobc(u, 1). In Fig. 2 the ego-node u is connected to DC(u)=5 firstneighbor nodes which are partially interconnected with each other. The maximum egobc value that u can attain, when no links between its neighbors are present, equals ( 5 2). From this value we need to subtract the number of pairs (like nodes 2-5 or 3-4) that share a direct link and therefore communicate without traversing u; their number equals the numerator of the clustering coefficient CC(u). Finally, we need to carefully account for those node pairs that share no direct link but are connected with multiple 2-hop paths, such as nodes 2 and 4 that are connected via the paths 2-3-4, 2-u-4 and The idea is that only one of those paths will cross u; thus, we need to discount the original contribution (i.e., unit) of each non-directly connected node pair i, j N1 u by as much as the inverse of the number of competing 2-hop paths connecting i and j. This numbercorrespondsto the element (i, j) of matrix A 2, where A is the adjacencymatrix for G u 1. Summing up, we derive the expression for the first-order egocentric betweenness centrality in Eq. 1. The egocentric counterpart of conditional betweenness centrality (egocbc), on the other hand, is less straightforward. For each ego network and for a given destination node t, we need to identify the set of exit nodes e r (u; t) = {t Nr u : h(u, t ) +h(t, t) = h(u, t)}, i.e., all nodes r hops away from the ego node u that lie on the shortest path(s) from u to t. This set is effectively the projection of the remote node t on the local ego network and may be a singleton but never the null set. In Fig. 1, for example, we have e 1 (u; 11) = {6}, e 1 (u; 9) = {4, 6} for the G u 1 (left graph) and e 2 (u; 11) = {1}, e 2 (u; 14) = {5, 8}for the G u 2 (right graph).

4 4 egobc(u; 1) = { ( DC(u) ) 2 (1 CC(u)) i,j N1 u:h(i,j)=2(1 1 ) if DC(u) > 1 A 2 i,j if DC(u) = 1 (1) For each node s G u r, we need to calculate the fraction of shortest paths from s towards any of the nodes in e r (u; t) that traverse the ego node. Thus the egocentric variant of CBC is given by egocbc(u; t, r) = s V u r t e r(u;t) σ st (u) 1 {h(s,t ) h(s,l), l e σ r(u;t)} st (2) Again, in Fig. 1a, node 4 contributes to the egocbc(u, 11) value since its shortest path to the single exit node 6 traverses u, although it has a shorter path to node 11, via nodes {5,1} that lie outside the ego network. Likewise, its contribution is a full unit, rather than 1/2, since the second shortest path to node 6 passes through node 5, a node outside the ego network of u.thisisthepriceegocentricmetricspayforbeingagnostic of the world outside their r-neighborhood. Although, the definitions of both ego- and sociocentric metrics are valid under weighted and unweighted graphs, we focus on the latter ones. The way link weights affect the correlation operations is clearly worth of a separate study. C. Complexity comparison of betweenness counterparts We briefly discuss how the two types of metrics compare in terms of message overhead and time complexity required for their computation. Message overhead is measured in messages times number of edges they have to travel. In both cases, we can distinguish two metric computation phases: the collection of topological information and the execution of computations. Sociocentric computation of centrality. The network nodes need to collect global information about the overall network topology; hence, each one of the V network nodes has to inform the other V 1 about its neighbors. This generally requires O( E f ) message copies and O(D) time steps for each node s message, where D is the network diameter and E f the number of edges in the flooding subgraph.in the best case, the flooding takes place over the nodes spanning trees, hence the message overhead is O( V 1). For the distribution of one round of messages by all nodes, the overhead becomes O( V 2 ); the time remains O(D) assuming that the process evolves in parallel. With knowledge of the global topology, each node can compute the BC values of all other nodes in the network. An efficient way to do this is to invoke Brandes algorithm[9], featuring O( V E ) complexity for unweighted graphsand O ( ( E + V ) V log V ) complexityforweighted graphs. Interestingly, the CBC values of each network node with respect to all other network nodes, emerge as intermediate results of Brandes algorithm for the BC computation 4. Egocentric computation of centrality. Intuitively, the egocentric variants save complexity. The message overhead over the whole network is O(2 E ) for the ego network with r = 1 and O(2 d max E ) for the ego network with r = 2, where d max is the maximum node ; for dense graphs this overhead becomes O( V 2 ). The time required for the distribution of information is of no concern, O(1). The egobc and egocbc computation for r = 1 can be carried out as in [2]. The computation involves a multiplication of an O(d max )-size square matrix and trivial condition checks. For r = 2, we can employ [9] replacing V with d 2 max. Finally, DC is considered to be immediately available to every node. TABLE I COMPLEXITY COMPARISON OF SOCIO- vs. EGO-CENTRIC METRICS Metric Time complexity Message overhead BC O( V 3 ) O(D V ) egobc (r=1) O(d 3 max ) O(2 E ) egobc (r=2) O(d 4 max ) O(2 dmax E ) CBC O( V 3 ) O(D V ) egocbc(r=1) O(d 3 max ) O(2 E ) egocbc(r=2) O(d 4 max ) O(2 dmax E ) DC O(1) As expected,since d max is typically muchsmaller than V, the use of local metrics bears apparent computational benefits. The question of whether these metrics correlate well with the sociocentric ones is considered next. III. EXPERIMENTAL CORRELATION OPERATIONS STUDY BETWEEN SOCIO- AND EGOCENTRIC CENTRALITY METRICS A. Correlation coefficients In comparing the ego- with sociocentric metrics, we are mostly concerned with their rank correlation. The underlying remark is that in protocol implementations that seek to utilize highly central nodes, we usually care more about the way the metric ranks the network nodes rather than their absolute metric values. For example, this is how a -based search scheme explores unstructured p2p networks [7] or the egobc metric is used in DTN routing protocols[2], [3]. Alternatively, we may need to utilize only a small number of k nodes that exhibit the top centrality values [22] and therefore, we include in our study the ovelap scores between the top-k nodes determined with ego- and sociocentric counterparts, respectively. We capture the rank correlation in the nonparametric Spearman measure of correlation, ρ, which assesses 4 The algorithm in [9] effectively visits successively each node u V and runs augmented versions of shortest path algorithms. By the end of each run, the algorithm has computed the V 1 CBC(v; u) values, v V; while the V BC(v) values result from iteratively summing these values as the algorithm visits all network nodes u V.

5 5 how monotonic is the relationship between the ranks of the two centrality variables and is computed as follows: 6 (r s (u) r e (u)) 2 u V ρ = 1 V ( V 2 (3) 1) where r s (u) and r e (u) are the ranks of each graph node when ordered according to the sociocentric and egocentric definition of the metrics, respectively. For the sake of a comprehensive study we complete the presented results with the well-known linear Pearson correlation. The r Prs coefficient as well assesses a straight-line relationship between the two variables but now the calculation is based on the actual data values. Both ρ and r Prs lie in [-1,1]. If being close to 1 we can only infer significant correlation between the considered variables. For the pairs of the socio- and ego- betweenness variants (sb(u), eb(u)) of each node u V, the Pearson r is given by the equation: (sb(u) sb)(eb(u) eb) u V r = (4) (sb(u) sb) 2 (eb(u) eb) 2 u V u V When the involved parameters vary along the node location (i.e., CBC values), we present the correlation averages along with the 95% confidence intervals, estimated over an at least 6% of the total locations, sample. B. Network topologies We have placed emphasis on the experimentation study with the real-world intradomain Internet topologies. Nevertheless, synthetic graph models with distinct structural properties such as the two-dimensional rectangular grid have been as well employed to complete our study. The router-level ISP topolgies, on the other hand, do not have the predictable structure and properties of the synthetic topologies and may differ substantially one from another, typically sizing up to a few thousands of nodes. Yet it is over such topolgies that networking protocols will seek to rely their operation on localized centrality metrics [22]. Three sets of routerlevel topologies discovered by different techniques have been employed: mrinfo topologies: The dataset we consider[24] includes topology data from 85 distinct snapshots of 14 different AS topologies, corresponding to Tier-1, Transit and Stub ISPs [25]. The data were collected daily during the period 24-8 with the help of a multicast discovering tool called mrinfo, which circumvents the complexity and inaccuracy of more conventional measurement tools. Herein we present and discuss results from a representative subset of the datasets (Tier-1 and Transit ISP networks) exhibiting adequate variance in size, diameter, and connectivity statistics. Rocketfuel topologies: The Rocketfuel technique [26] has been shown to collect high-fidelity router-level maps of ISPs and therefore has been widely used despite its old, TABLE II CORRELATION STUDY BETWEEN BC AND EGOBC ON GRID NETWORKS Grid size Diameter / Mean Spearman ρ ego-network (r=1) ego-network (r=2) 5x5 8 / x1 18 / x15 28 / x2 38 / x5 98 / x8 66 / x8 96 / x8 156 / x8 46 / around 22, publication. The considered dataset [27] includes measurements from 8 vantage points serving as traceroute sources. A number of innovative techniques such as BGP directed probing, use of DNS names and IP identifiers have been applied to reduce the number of probes, identify what part of the trace belongs to a certain ISP and discover the different interface IP addresses that belong to the same router (i.e., alias resolution), respectively. CAIDA topologies: The third and most recent dataset [28] we have used in our experiments was collected during Oct- Nov 211 by CAIDA performing traceroute probes to randomly-chosen destinations from 54 monitors located in 29 countries worldwide. We have processed the routerlevel raw data files derived from tools (i.e., MIDAR and iffinder[28]) that were run over approximately two million IPv4 addresses and achieved the highest aliases-resolution confidence; parsing the provided separate file that heuristically assigns an AS to each node found, we have determined the router-to-as ownership and subsequently have extracted out of the large raw data files the topologies of the nodes operated by certain ASes. Our effort was to discover the largest ISP networks present in the dataset to further broaden our experimentation topology set. With all three datasets we avail a rich experimentation basis of a diverse Internet topologies set that can limit the effect of any measurement technique errors and provide our results with extra credibility. C. Experimental results We choose to spend more of our effort experimenting on the BC-egoBC and BC-DC correlation debates that are expected to attract more interest (see relevant applications in the Section IV) as opposed to the limited scope of CBC. Note also that in router-level Internet topologies the BC- DC correlation has been so far taken for granted rather than experimentally shown. egobc vs. BC :In the grid topologies, ego networks have fixed size depending on their relative position, i.e., corner, side, or internal nodes. The ego networks are star networks of 3, 4 and 5 nodes, respectively, for r = 1; they may have size up to 6, 9, and 12 nodes, respectively, for r = 2. Thus, the egobc index may only exhibit three values (i.e., 1, 3 and 6) with respect to the node s location when r = 1 In case of r = 2

6 6 the egobc cannot exceed the value of 28 (i.e., when the ego network size reaches its upper bound). Table II suggests that the rank correlation values decrease monotonically with the grid size. As one or both grid dimensions grow larger, the number of shortest paths between any node pair grows exponentially, resulting in a richer spectrum of BC metric values over the grid node population. On the other hand, the possible egobc values remain the same; only the distribution of grid nodes over these values changes (see Fig. 3). The same behavior and reasoning holds for another regular topology, the line network, where the corresponding rank correlation may be as high as 1 for a line of a few nodes while fast decreasing as its size grows larger. Our findings for the real-world ISP topologies are listed in Table III. Even with measurements within the first-order ego network, there is high positive rank correlation between BC and egobc. Yet some ISP networks (e.g., AT&T and Sprint) show clearly stronger correlation than others (e.g., China Telecom). On the other hand, the Pearson linear correlation coefficient suggests looser yet positive association between the two variants (in almost all datasets). If nodes are willing to tolerate the extra overhead related to computing egobc in the second-order ego network (see II-C), the correlation values for both coefficients become even higher but also more similar with each other, despite the differentiation in network size. The general structural characteristics of the considered ISP topologies differ from the grid topologies. No regularities are reported; their diameter and clustering coefficient attain many different values as their size scales. Provably there is enough asymmetry throughout the topology to yield a wide range of BC and egobc values and favor high correlation values between the two. There is one notable exception from this rule, the Level-3 ISP topology (dataset 12,13) of the mrinfo dataset explored later in Section III-D. Finally, note that the above results are also relevant to the localized bridging centrality metric [16] which employs the egobc as an alias to the BC metric; it follows that the two bridging centrality counterparts are higly correlated in these topologies. DC vs. BC: We examine the DC values which can be immediately available at each node, as a candidate to locally approximate the corresponding nodes BC. In the considered synthetic topologies we have observed the same correlation (both Spearman and Pearson) degradation with the network size, explained along the aforementioned BC-spectrum arguments. In the router-level topologies (Table III) we find high Pearson and even higher Spearman correlation over a broad range of ISPs although consistently lower than the corresponding egobcvs. BC one, at least for the valuesof the latter coefficient. Our results actually extend the previously reported [6] or inferred [18] (based on the scaling laws of the load i.e., a BC approximation) DC-BC correlation over AS-level topologies and synthetic scale-free networks, respectively, to the intra-domain router-level topologies. Moreover, note that the observed high rank correlation between egobc and BC can be further justified on the grounds of the high DC-BC Spearman values. Indeed, the router-level topologies exhibit very small mean clustering coefficient values and therefore, according to eq. 1 the egobc metric attains almost identical values to the DC ones. This is depicted in the scatterplot of Fig. 4 where the egobc-dc correlation appears to scale linearly with the mean clustering coefficients, especially in the CAIDA dataset. egocbc vs. CBC : We devoteadifferentset of experiments to the assessment of the ego variant of the CBC metric (r=1). The high ρ values of Table IV suggest significant positive rank correlation in all considered ISP topologies. Especially for the outlier case of the mrinfo Level-3 networks the correlation turns out to be considerably increased, compared to the one between the BC variants. Intuitively, the correlation of CBC with egocbc values is expected to be higher than the BC vs. ego-bc counterpart; by neglecting the world outside of the ego network, the egobc inaccuracies (compared to the globally determined BC) may arise anywhere across the whole network. On the contrary, the egocbc(u; t, r) considers only the paths that lead to the target t, somehow focusing on an angle that encompasses t; thus, it may differ from the CBC(u;t) view only across that certain angle. top-k nodes overlap : Our final experiment seeks to assess the extend to which the nodes with the top-k values of localized centrality metrics coincide with the corresponding ones determined with respect to the global BC. It is interesting to observe in Table V that the top-k nodes identified by the different localized counterparts exhibit relatively low overlap, at least for the first-order ego network measurements, with the globally top central ones. This does not actually contradicts our previous results since the correlation coefficients are determined over all network nodes rather than a subset of cardinality k. Clearly, the observed high rank-correlation is mainly due to nodes of lower rank; for instance, those with already zero values for both centrality counterparts (i.e., DC=1) have been reported to drastically contribute to the high egobc-bc correlation [2]. Along this thread, our comprehensive study of the following subsection shows that the actual association between the two metric variants is not determined solely by the distribution. Finally, the low top-k overlap scores a) help us infer that the protocols utilizing a handful of top central nodes through localized approximations, are expected to perform poorly. b) serve as a warning sign regarding to what the high coefficients can reveal about the practical implications of rank-preserving localized centrality metrics (see Section IV). D. Pathologies in the mrinfo Level-3 ISP snapshots We nowcomebacktothemrinfodatasetwherethe Level- 3 ISP topologies exhibit an exceptional behavior with respect to the outcome of the studied BC-egoBC correlation (see Table III). Neither the relatively extreme values of the network diameter, nor the considerably higher mean of Level-3 topologies can justify the poor ρ values or even more, the negative r Prs ones. To further elaborate on this, we studied

7 betweenness values betweenness values betweenness values betweenness values a. BC (5x5) b. BC (1x1) c. egobc (5x5) d. egobc (1x1) Fig. 3. Probability distribution of BC and egobc values for scaling size of a grid network. TABLE III CORRELATION STUDY BETWEEN BC-EGOBC AND BC-DC ON INTRA-DOMAIN ISP TOPOLOGIES DataSet ID ISP(AS number) <CC> Diameter Size <> BC vs. ego-bc BC vs. DC Spearman ρ Pearson r Prs ego-net. r=1 ego-net. r=2 ego-net. r=1 ego-net. r=2 Spearman ρ Pearson r Prs 36 Global Crossing(3549) // NTTC-Gin(2914) Sprint(1239) Level-3(3356) m 12 -// r 2 Sprint(1239) i 9 -// n 4 JanetUK(786) f 45 Iunet(1267) o 38 -// // Telecom Italia(3269) TeleDanmark(3292) R 6 VSNL(4755) O 61 Ebone(1755) C 62 Tiscali(3257) K 63 Exodus(3967) E 64 Telstra (1221) T 65 Sprint(1239) Level-3(3356) F 67 AT&T(718) L 68 Verio (2914) UUNet (71) C 71 COGENT/PSI(174) A 72 LDComNet(15557) I 73 TeliaNet(1299) D 74 ChinaTelecom(4134) A 75 FUSE-NET(6181) JanetUK(786) Mean Clustering Coefficient CAIDA mrinfo Rocketfuel Spearman ρ (egobc DC) Fig. 4. Linear relations between the egobc-dc correlation and <CC> values. the distribution of these topologies that were found to exhibit an unusual to the whole dataset, bimodal-like shape with two distinct high peaks at values 3 and 6 and little mass at value 1 (see Fig. 5). This finding seems consistent with the remark about the role of nodes with one in [2]. Nodes with 1 have zero values of both BC and egobc. Therefore, a network availing a large percentage of such nodes has higher chances for an overall higher correlation DataSet DataSet DataSet DataSet DataSet DataSet Fig. 5. Indicative set of the mrinfo ISP topologies distribution coefficient than those with fewer nodes. To test further this hypothesis, we generated multiple random graphs[29] feeding the generator with the distribution of the Level-3 outliers. Precisely, for each one of the Level-3 datasets 16, 18, 27 and 28 we have generated a couple (i.e., named a and b, respectively) of new topologies characterized by the same distribution as the Level-3 original ones. In

8 8 TABLE IV CORRELATION BETWEEN CBC AND EGO-CBC (R=1) ON ISP TOPOLOGIES Spearman ρ 95% Confidence interval Table VI we report the properties of each topology along with the measured BC-egoBC rank correlation. The resulting high correlation between BC and egobc-driven node rankings of the generated topologies (i.e.,.84 to.95) implies that the actual association between the two metric variants is not determined solely by the distribution. Note that the rank correlation for Level-3 topology snapshots (back in Table III) improves significantly when egobc is computed within the second-order ego network. Following the remark about nodes with one we present in Table VI the α EQ percentage of nodes (for both Level-3 ISP and the corresponding generated network) that exhibit equal BC and egobc values. The relative high α EQ ( %) of the Level-3 topologies is not sufficient to result in high positive correlation between BC and egobc values. Taking one step further, we measure the percentage α LE of network nodes that attain lower BC values than egobc. Interestingly, the original Level-3 exhibit values of α LE as high as 23% whereas the corresponding generated topologies avail no such nodes. Contrary to intuition it seems that the considered Level-3 topologies avail a critical mass of nodes for which the transition from the restricted egocentric view to the global topology approach results in the decrease of the corresponding centrality values. Clearly, such nodes have negative contribution to the measured BC-egoBC rank correlation. Fig. 6. Vizualization of an original mrinfo Level-3 snapshot (left) and a generated topology with the same distribution (right). Fig. 7. Configurations of topology s cluster endings that result in egobc values of certain nodes exceeding their BC ones. To shed some light on the topology configuration that causes this counterintuitive result, we visualize in Figure 6 an original Level-3 topology together with its corresponding generated one. The Level-3 snapshot seems to consist of a lengthy backbone on which two cluster endings are attached. It is the configuration of the links among the cluster nodes that makes some of them unreachable from shortest paths that stem from network nodes outside the current cluster. The corresponding high α LE percentage is due to a significant portion of such cluster nodes; node like 5 in Fig. 7(left) or 5, 6 and 7 in Fig. 7(right) are the ones that fall in this category and therefore, exhibit higher ego- than socio- BC values. In particular node 5 in Fig. 7a has an egobc value equal to ( d(5) 2 ) ( = 4 ) 2 = 6 while its socio- variant is determined by all possible pairs between nodes 1, 2, 3 and 4; one out of the two shortest paths linking those pairs traverse node 5 i.e., BC(5) = 1/2 (4 2) = 3. Consequently, the higher the number of Level-3 clusters, the higher the number of nodes that impede the BC variants high rank correlation. On the contrary the Dataset 18a generated topology (with the same distribution as 18) forms no cluster and furthermore, exhibitszerovaluesforthe α LE percentage.thischaracteristic turns out to provide the topology with high correlation between the centrality variants even if the percentage α EQ remains significantly low. Finally, note that the Level-3 snapshot of the Rocketfuel dataset (i.e., id 66) published about 8 years earlier than the mrinfo one, does not exhibit the above problematic clustered configurations. IV. PRACTICAL UTILITY OF LOCAL CENTRALITY METRICS We outline examples, where locally measured centrality metrics are employed, encouraged by the high corresponding correlation, to substitute the global ones and assist with critical network operations. Our aim is to assess whether such options can actually be effective in networking practice. A. Identifying vulnerable network locations: a resilience study First, we elaborate on a rather theoretical scenario i.e., sequentially selecting crucial network nodes and studying the effect of having them shut-down (removed) on the routerlevel connectivity structure. The node selection is carried out on the basis of the each time top value of a global(i.e., BC) or alternatively local(i.e., egobc, DC) centrality metric. Typically, we are interested in measuring the resulted increase of the average path length and the clustering coefficient variations. However, we observe that the ISP topologies bear

9 9 TABLE V OVERLAP(%) BETWEEN NODES WITH THE TOP-k LOCALIZED CENTRALITY AND BC VALUES k=1 k=3 egobc(r=1) egobc(r=2) DC egobc(r=1) egobc(r=2) DC TABLE VI PROPERTIES OF ORIGINAL MRINFO LEVEL-3 (bold) AND GENERATED TOPOLOGIES WITH THE SAME DEGREE DISTRIBUTION DataSet ISP (AS number) <CC > Diameter Size <> variance Spearman ρ α EQ (%) α LE (%) 16 Level-3 (3356) a generated // b generated // Level-3 (3356) a generated // b generated // Level-3 (3356) a generated // b generated // Level-3 (3356) a generated // b generated // TABLE VII NUMBER OF NODES TO BE REMOVED FOR NETWORK FRAGMENTATION Node Dataset s fragmentation number removal criterion ID 5 ID 64 ID 71 ID 72 top BC value top egobc(r=1) value top egobc(r=2) value top DC value very few node removals (encountered by the fragmentation number in Table VII) until they become disconnected and thus, hindering the detailed assessment of the localized metrics capacity to identify the same critical nodes as the global do. Two remarks coming out of this study are a) the egobc and DC appear to be equivalent in terms of locating nodes that hold the network together as opposed to the BC metric which may render different ones as important; as earlier discussed, it is the vanishing clustering coefficient values that result in the egobc values closely approximating the DC ones. and b) the fact that the attack on high DC/egoBC nodes results in the fragmentation of the ISP topologies is in good agreement with previous studies that model the router-level topologies as scale-free graphs and argue about their robustness to randomly chosen nodes removal, likely to take out those with small. On the contrary, the removal of a few key-hubs splinters the topology into groups of isolated routers [3]. B. A local-centrality-driven navigation scheme We now explore whether a practical navigation scheme can benefit from local centrality metrics. To replace the wasteful broadcasting of queries in search of a target data file in unstructured power-law P2P networks, it has been shown [7] that a high- seeking strategy is more efficient than a randomwalk strategy. The former, at each step, passes a single query message to a neighboring node of higher exploiting the availability of many network links pointing to high nodes. Following the thread, the work in [31] proposes a local-scope BC (LBC) to drive the search and shows that the difference between the high- and high-lbc search increases with the network edge weights heterogeneity. We have implemented a similar navigation scheme that crawls the network following a MAX or MAX-MIN pattern with respect to node centrality; each time, the crawler moves to the neighbor with the maximum(minimum) centrality out of those that exhibit higher(lower) values than the current node, utilizing a self-avoiding path. We randomly select 2% of the network nodes as starting points and execute 1 runs (i.e., crawlings) for each one but with no destinations predetermined. Effectively, we seek to compare the navigation patterns and final locations achieved by using the different centrality variants as drivers. α-hops overlap measures the percentage of the final locations lying within α hops away from those the global metric yields. Zero-hop overlap clearly refers to the destinations exact matching. Regarding the final locations, figs. 8a-d) show that the local metrics (r=1) can hardly be effective aliases for the global ones. In Table VIII the crawler, driven by local metrics, is measured to consistently take, up to 2.3 on average, less hops than when it is BC-driven. It also reaches multiple unique final locations (i.e., UFL) compared to the few ones where it ends-up driven by BC; similar results are obtained for the MAX-MIN pattern. These findings clearly suggest that the crawler driven by local centrality metrics fails to identify the same navigation pattern i.e., sequence of central nodes the global BC identifies. In view of the high correlation between the involved met-

10 1 zero hop overlap (%) egobc(r=1) egobc(r=2) DC one hop overlap (%) 1 egobc(r=1) egobc(r=2) 8 DC zero hop overlap (%) 1 egobc(r=1) egobc(r=2) 8 DC one hop overlap (%) 1 egobc(r=1) egobc(r=2) 8 DC a. MAX navigation pattern b. MAX navigation pattern c. MAX-MIN navigation pattern d. MAX-MIN navigation pattern Fig. 8. Performance of local-information-based search scheme in terms of zero- and one-hop overlap with the BC-determined final locations. ID <hopcount> UFL <hopcount> UFL <hopcount> UFL <hopcount> UFL <hopcount> UFL BC ± ± ± ± ± egobc(r=1) ± ± ± ± ± egobc(r=2) ± ± ± ± ± DC ± ± ± ± ± TABLE VIII MEAN HOPCOUNT AND UNIQUE FINAL LOCATIONS(UFL) FOR THE MAX PATTERN CENTRALITY-DRIVEN NAVIGATION SCHEME Fig. 9. Toy topology with egobc-bc and DC-BC perfect rank correlation. rics, we have tried to shed some light on the somewhat counterintuitive, poor navigation performance. We have built a toy topology (Fig. 9 where the rank correlation between the considered counterparts is perfect (i.e., ρ =1). Removing sequentially the nodes 5,6,17 and 18, we measure the rankcorrelation reducing from 1 to.9953 while the zero-hop overlap for the MAX pattern drastically diminishes from 1% to 61.9%. Clearly, the numerical summaries provided by the correlation coefficients fail to capture/reflect in micro-level the relative significance of each node which heavily determines the scheme s performance. C. A local-centrality-driven search scheme As the conditional centrality metrics involve a target node, we are enabled to compare CBC and egocbc essentially over a (content) search scheme. For each starting location we randomly select a target node and seek to reach it utilizing a MAX search pattern. Fig. 1.a shows low ovelap between the final locations achieved by the two counterparts while the hopcount to the final location is again measured consistently lower (i.e.,.3 to 1.5 hops) for the egocbc case. Driven by the local variant the search fails to track closely the route that the global one induces. In terms of the one-hop overlap between the achieved final locations and the targets (i.e., hit-rates), which is also reported in[7], figure 1.b shows that the egocbc-driven search indeed hits significantly less targets than the CBC-driven does. The number of targets reached by the local CBC variant is in good agreement with the discovered P2P nodes in [7], using DC as a driver; there, a networkwide path of the query may cumulatively hit up to 5% of either the targets or their first neighbors. On the contrary, we obtain high values when the global metric drives the MAX search pattern, since the closer a node u lies to the target t the higher its CBC(u; t) index. α hop overlap a=zero a=one one hop overlap egocbc target CBC target a. MAX search pattern b. MAX search pattern Fig. 1. a) Performance of local-information-based search scheme in terms of zero- and one-hop overlap with the CBC-determined final locations. b) One-hop overlap between the egocbc-/cbc-determined final locations and the targets i.e., the hit-rate of the search scheme. V. CONCLUSIONS The paper has questioned to what extent the original centrality metrics can be substituted by their computationally friendly local approximations in router-level topologies. First, the metrics are shown to exhibit high rank-correlation with their local counterparts across all datasets (22 ISPs) but one. Ontheotherhand,thematchbetweenthetwo variantsismuch worse when we compare the top-k nodes selected by each of them. Then, we tried to assess what the algebraic values of the correlation coefficients reveal regarding the performance of local centrality-driven network functions. Both a simple navigation and a search scheme employing local centrality metrics produce significantly different navigation patterns and lower hit-rates, respectively, than their counterparts with the original global metrics. These results suggest that, despite the positive correlations, local variants can hardly offer effective approximations to the original metrics. Our work essentially

On the Local Approximations of Node Centrality in Internet Router-Level Topologies

On the Local Approximations of Node Centrality in Internet Router-Level Topologies On the Local Approximations of Node Centrality in Internet Router-Level Topologies Panagiotis Pantazopoulos, Merkourios Karaliopoulos, and Ioannis Stavrakakis Department of Informatics and Telecommunications

More information

Low-cost Enhancement of the Intra-domain Internet Robustness Against Intelligent Node Attacks

Low-cost Enhancement of the Intra-domain Internet Robustness Against Intelligent Node Attacks Low-cost Enhancement of the Intra-domain Internet Robustness Against Intelligent Node Attacks Panagiotis Pantazopoulos Ioannis Stavrakakis Department of Informatics and Telecommunications, Advanced Networking

More information

Centrality-driven Scalable Service Migration

Centrality-driven Scalable Service Migration Centrality-driven Scalable Service Migration Panagiotis Pantazopoulos, Merkouris Karaliopoulos, Ioannis Stavrakakis presented by M. Karaliopoulos Advanced Networking Research Group National and Kapodistrian

More information

The Multiple Instances of Node Centrality and their Implications on the Vulnerability of ISP Networks

The Multiple Instances of Node Centrality and their Implications on the Vulnerability of ISP Networks The Multiple Instances of Node Centrality and their Implications on the Vulnerability of ISP Networks George Nomikos Panagiotis Pantazopoulos Merkourios Karaliopoulos Ioannis Stavrakakis Department of

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most

More information

1 More configuration model

1 More configuration model 1 More configuration model In the last lecture, we explored the definition of the configuration model, a simple method for drawing networks from the ensemble, and derived some of its mathematical properties.

More information

Mining Web Data. Lijun Zhang

Mining Web Data. Lijun Zhang Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

More information

Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization

Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Robert Beverly, Arthur Berger, Geoffrey Xie Naval Postgraduate School MIT/Akamai February 9, 2011 CAIDA Workshop

More information

Middle School Math Course 2

Middle School Math Course 2 Middle School Math Course 2 Correlation of the ALEKS course Middle School Math Course 2 to the Indiana Academic Standards for Mathematics Grade 7 (2014) 1: NUMBER SENSE = ALEKS course topic that addresses

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

THE preceding chapters were all devoted to the analysis of images and signals which

THE preceding chapters were all devoted to the analysis of images and signals which Chapter 5 Segmentation of Color, Texture, and Orientation Images THE preceding chapters were all devoted to the analysis of images and signals which take values in IR. It is often necessary, however, to

More information

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs : A Distributed Adaptive-Learning Routing Method in VDTNs Bo Wu, Haiying Shen and Kang Chen Department of Electrical and Computer Engineering Clemson University, Clemson, South Carolina 29634 {bwu2, shenh,

More information

Mining Web Data. Lijun Zhang

Mining Web Data. Lijun Zhang Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 2 Part 4: Dividing Networks into Clusters The problem l Graph partitioning

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

HIERARCHICAL clustering analysis (or HCA) is an

HIERARCHICAL clustering analysis (or HCA) is an A Data-Driven Approach to Estimating the Number of Clusters in Hierarchical Clustering* Antoine E. Zambelli arxiv:1608.04700v1 [q-bio.qm] 16 Aug 2016 Abstract We propose two new methods for estimating

More information

Internet Measurements. Motivation

Internet Measurements. Motivation Internet Measurements Arvind Krishnamurthy Fall 2004 Motivation Types of measurements Understand the topology of the Internet Measure performance characteristics Tools: BGP Tables Traceroute measurements

More information

Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning

Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning Devina Desai ddevina1@csee.umbc.edu Tim Oates oates@csee.umbc.edu Vishal Shanbhag vshan1@csee.umbc.edu Machine Learning

More information

4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009

4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009 4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009 Information Theoretic Analysis of Proactive Routing Overhead in Mobile Ad Hoc Networks Nianjun Zhou, Member, IEEE, Alhussein

More information

Towards more robust internetworks:

Towards more robust internetworks: Towards more robust internetworks: an application of graph theory Authors Jamie Greenwood, MSc (Royal Holloway, 2016) Stephen Wolthusen, ISG, Royal Holloway Abstract As networks become increasingly connected

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

3. Cluster analysis Overview

3. Cluster analysis Overview Université Laval Multivariate analysis - February 2006 1 3.1. Overview 3. Cluster analysis Clustering requires the recognition of discontinuous subsets in an environment that is sometimes discrete (as

More information

Overcompressing JPEG images with Evolution Algorithms

Overcompressing JPEG images with Evolution Algorithms Author manuscript, published in "EvoIASP2007, Valencia : Spain (2007)" Overcompressing JPEG images with Evolution Algorithms Jacques Lévy Véhel 1, Franklin Mendivil 2 and Evelyne Lutton 1 1 Inria, Complex

More information

Hyperbolic Traffic Load Centrality for Large-Scale Complex Communications Networks

Hyperbolic Traffic Load Centrality for Large-Scale Complex Communications Networks ICT 2016: 23 rd International Conference on Telecommunications Hyperbolic Traffic Load Centrality for Large-Scale Complex Communications Networks National Technical University of Athens (NTUA) School of

More information

Importance of IP Alias Resolution in Sampling Internet Topologies

Importance of IP Alias Resolution in Sampling Internet Topologies Importance of IP Alias Resolution in Sampling Internet Topologies Mehmet H. Gunes and Kamil Sarac Global Internet Symposium 007, Anchorage, AK Introduction: Internet Mapping Topology measurement studies

More information

3. Cluster analysis Overview

3. Cluster analysis Overview Université Laval Analyse multivariable - mars-avril 2008 1 3.1. Overview 3. Cluster analysis Clustering requires the recognition of discontinuous subsets in an environment that is sometimes discrete (as

More information

Understanding the effect of streaming overlay construction on AS level traffic

Understanding the effect of streaming overlay construction on AS level traffic Understanding the effect of streaming overlay construction on AS level traffic Reza Motamedi and Reza Rejaie Information and Computer Science Department University of Oregon e-mail: {reza.motamedi,reza}@cs.uoregon.edu

More information

CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp

CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp Chris Guthrie Abstract In this paper I present my investigation of machine learning as

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Optimizing Random Walk Search Algorithms in P2P Networks

Optimizing Random Walk Search Algorithms in P2P Networks Optimizing Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik Rensselaer Polytechnic Institute Troy, New York bisnin@rpi.edu Alhussein A. Abouzeid Rensselaer Polytechnic Institute Troy, New

More information

Chapter 2 Basic Structure of High-Dimensional Spaces

Chapter 2 Basic Structure of High-Dimensional Spaces Chapter 2 Basic Structure of High-Dimensional Spaces Data is naturally represented geometrically by associating each record with a point in the space spanned by the attributes. This idea, although simple,

More information

Error Analysis, Statistics and Graphing

Error Analysis, Statistics and Graphing Error Analysis, Statistics and Graphing This semester, most of labs we require us to calculate a numerical answer based on the data we obtain. A hard question to answer in most cases is how good is your

More information

Structural and Syntactic Pattern Recognition

Structural and Syntactic Pattern Recognition Structural and Syntactic Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2017 CS 551, Fall 2017 c 2017, Selim Aksoy (Bilkent

More information

round decimals to the nearest decimal place and order negative numbers in context

round decimals to the nearest decimal place and order negative numbers in context 6 Numbers and the number system understand and use proportionality use the equivalence of fractions, decimals and percentages to compare proportions use understanding of place value to multiply and divide

More information

CENTRALITIES. Carlo PICCARDI. DEIB - Department of Electronics, Information and Bioengineering Politecnico di Milano, Italy

CENTRALITIES. Carlo PICCARDI. DEIB - Department of Electronics, Information and Bioengineering Politecnico di Milano, Italy CENTRALITIES Carlo PICCARDI DEIB - Department of Electronics, Information and Bioengineering Politecnico di Milano, Italy email carlo.piccardi@polimi.it http://home.deib.polimi.it/piccardi Carlo Piccardi

More information

On Reshaping of Clustering Coefficients in Degreebased Topology Generators

On Reshaping of Clustering Coefficients in Degreebased Topology Generators On Reshaping of Clustering Coefficients in Degreebased Topology Generators Xiafeng Li, Derek Leonard, and Dmitri Loguinov Texas A&M University Presented by Derek Leonard Agenda Motivation Statement of

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn

More information

An Approach to Task Attribute Assignment for Uniprocessor Systems

An Approach to Task Attribute Assignment for Uniprocessor Systems An Approach to ttribute Assignment for Uniprocessor Systems I. Bate and A. Burns Real-Time Systems Research Group Department of Computer Science University of York York, United Kingdom e-mail: fijb,burnsg@cs.york.ac.uk

More information

Properties of Biological Networks

Properties of Biological Networks Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási

More information

Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys

Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys Mathias Wagner, Stefan Heyse mathias.wagner@nxp.com Abstract. We present an improved search

More information

Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows)

Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows) Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows) Average clustering coefficient of a graph Overall measure

More information

Scale Free Network Growth By Ranking. Santo Fortunato, Alessandro Flammini, and Filippo Menczer

Scale Free Network Growth By Ranking. Santo Fortunato, Alessandro Flammini, and Filippo Menczer Scale Free Network Growth By Ranking Santo Fortunato, Alessandro Flammini, and Filippo Menczer Motivation Network growth is usually explained through mechanisms that rely on node prestige measures, such

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

Review of feature selection techniques in bioinformatics by Yvan Saeys, Iñaki Inza and Pedro Larrañaga.

Review of feature selection techniques in bioinformatics by Yvan Saeys, Iñaki Inza and Pedro Larrañaga. Americo Pereira, Jan Otto Review of feature selection techniques in bioinformatics by Yvan Saeys, Iñaki Inza and Pedro Larrañaga. ABSTRACT In this paper we want to explain what feature selection is and

More information

Motivation. Technical Background

Motivation. Technical Background Handling Outliers through Agglomerative Clustering with Full Model Maximum Likelihood Estimation, with Application to Flow Cytometry Mark Gordon, Justin Li, Kevin Matzen, Bryce Wiedenbeck Motivation Clustering

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Massive Data Analysis

Massive Data Analysis Professor, Department of Electrical and Computer Engineering Tennessee Technological University February 25, 2015 Big Data This talk is based on the report [1]. The growth of big data is changing that

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Computer Sciences Department

Computer Sciences Department Computer Sciences Department Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination Ashok Anand Archit Gupta Aditya Akella Srinivasan Seshan Scott Shenker Technical Report

More information

Challenges on Combining Open Web and Dataset Evaluation Results: The Case of the Contextual Suggestion Track

Challenges on Combining Open Web and Dataset Evaluation Results: The Case of the Contextual Suggestion Track Challenges on Combining Open Web and Dataset Evaluation Results: The Case of the Contextual Suggestion Track Alejandro Bellogín 1,2, Thaer Samar 1, Arjen P. de Vries 1, and Alan Said 1 1 Centrum Wiskunde

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

Optimal Detector Locations for OD Matrix Estimation

Optimal Detector Locations for OD Matrix Estimation Optimal Detector Locations for OD Matrix Estimation Ying Liu 1, Xiaorong Lai, Gang-len Chang 3 Abstract This paper has investigated critical issues associated with Optimal Detector Locations for OD matrix

More information

Centrality Book. cohesion.

Centrality Book. cohesion. Cohesion The graph-theoretic terms discussed in the previous chapter have very specific and concrete meanings which are highly shared across the field of graph theory and other fields like social network

More information

Interleaving Schemes on Circulant Graphs with Two Offsets

Interleaving Schemes on Circulant Graphs with Two Offsets Interleaving Schemes on Circulant raphs with Two Offsets Aleksandrs Slivkins Department of Computer Science Cornell University Ithaca, NY 14853 slivkins@cs.cornell.edu Jehoshua Bruck Department of Electrical

More information

A Population Based Convergence Criterion for Self-Organizing Maps

A Population Based Convergence Criterion for Self-Organizing Maps A Population Based Convergence Criterion for Self-Organizing Maps Lutz Hamel and Benjamin Ott Department of Computer Science and Statistics, University of Rhode Island, Kingston, RI 02881, USA. Email:

More information

VOID FILL ACCURACY MEASUREMENT AND PREDICTION USING LINEAR REGRESSION VOID FILLING METHOD

VOID FILL ACCURACY MEASUREMENT AND PREDICTION USING LINEAR REGRESSION VOID FILLING METHOD VOID FILL ACCURACY MEASUREMENT AND PREDICTION USING LINEAR REGRESSION J. Harlan Yates, Mark Rahmes, Patrick Kelley, Jay Hackett Harris Corporation Government Communications Systems Division Melbourne,

More information

Adaptive Waveform Inversion: Theory Mike Warner*, Imperial College London, and Lluís Guasch, Sub Salt Solutions Limited

Adaptive Waveform Inversion: Theory Mike Warner*, Imperial College London, and Lluís Guasch, Sub Salt Solutions Limited Adaptive Waveform Inversion: Theory Mike Warner*, Imperial College London, and Lluís Guasch, Sub Salt Solutions Limited Summary We present a new method for performing full-waveform inversion that appears

More information

Chapter 10. Fundamental Network Algorithms. M. E. J. Newman. May 6, M. E. J. Newman Chapter 10 May 6, / 33

Chapter 10. Fundamental Network Algorithms. M. E. J. Newman. May 6, M. E. J. Newman Chapter 10 May 6, / 33 Chapter 10 Fundamental Network Algorithms M. E. J. Newman May 6, 2015 M. E. J. Newman Chapter 10 May 6, 2015 1 / 33 Table of Contents 1 Algorithms for Degrees and Degree Distributions Degree-Degree Correlation

More information

Clustering the Internet Topology at the AS-level

Clustering the Internet Topology at the AS-level Clustering the Internet Topology at the AS-level BILL ANDREOPOULOS 1, AIJUN AN 1, XIAOGANG WANG 2 1 Department of Computer Science and Engineering, York University 2 Department of Mathematics and Statistics,

More information

A Genetic Algorithm Framework

A Genetic Algorithm Framework Fast, good, cheap. Pick any two. The Project Triangle 3 A Genetic Algorithm Framework In this chapter, we develop a genetic algorithm based framework to address the problem of designing optimal networks

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Unsupervised learning in Vision

Unsupervised learning in Vision Chapter 7 Unsupervised learning in Vision The fields of Computer Vision and Machine Learning complement each other in a very natural way: the aim of the former is to extract useful information from visual

More information

CS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks

CS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks CS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks Archana Sulebele, Usha Prabhu, William Yang (Group 29) Keywords: Link Prediction, Review Networks, Adamic/Adar,

More information

Chapter 5. Track Geometry Data Analysis

Chapter 5. Track Geometry Data Analysis Chapter Track Geometry Data Analysis This chapter explains how and why the data collected for the track geometry was manipulated. The results of these studies in the time and frequency domain are addressed.

More information

Network Theory: Social, Mythological and Fictional Networks. Math 485, Spring 2018 (Midterm Report) Christina West, Taylor Martins, Yihe Hao

Network Theory: Social, Mythological and Fictional Networks. Math 485, Spring 2018 (Midterm Report) Christina West, Taylor Martins, Yihe Hao Network Theory: Social, Mythological and Fictional Networks Math 485, Spring 2018 (Midterm Report) Christina West, Taylor Martins, Yihe Hao Abstract: Comparative mythology is a largely qualitative and

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Unsupervised Learning and Clustering

Unsupervised Learning and Clustering Unsupervised Learning and Clustering Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2008 CS 551, Spring 2008 c 2008, Selim Aksoy (Bilkent University)

More information

Simplicial Complexes of Networks and Their Statistical Properties

Simplicial Complexes of Networks and Their Statistical Properties Simplicial Complexes of Networks and Their Statistical Properties Slobodan Maletić, Milan Rajković*, and Danijela Vasiljević Institute of Nuclear Sciences Vinča, elgrade, Serbia *milanr@vin.bg.ac.yu bstract.

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

Chapter S:II. II. Search Space Representation

Chapter S:II. II. Search Space Representation Chapter S:II II. Search Space Representation Systematic Search Encoding of Problems State-Space Representation Problem-Reduction Representation Choosing a Representation S:II-1 Search Space Representation

More information

number Understand the equivalence between recurring decimals and fractions

number Understand the equivalence between recurring decimals and fractions number Understand the equivalence between recurring decimals and fractions Using and Applying Algebra Calculating Shape, Space and Measure Handling Data Use fractions or percentages to solve problems involving

More information

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

CS 204 Lecture Notes on Elementary Network Analysis

CS 204 Lecture Notes on Elementary Network Analysis CS 204 Lecture Notes on Elementary Network Analysis Mart Molle Department of Computer Science and Engineering University of California, Riverside CA 92521 mart@cs.ucr.edu October 18, 2006 1 First-Order

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Foundations of Computing

Foundations of Computing Foundations of Computing Darmstadt University of Technology Dept. Computer Science Winter Term 2005 / 2006 Copyright c 2004 by Matthias Müller-Hannemann and Karsten Weihe All rights reserved http://www.algo.informatik.tu-darmstadt.de/

More information

1 Introduction RHIT UNDERGRAD. MATH. J., VOL. 17, NO. 1 PAGE 159

1 Introduction RHIT UNDERGRAD. MATH. J., VOL. 17, NO. 1 PAGE 159 RHIT UNDERGRAD. MATH. J., VOL. 17, NO. 1 PAGE 159 1 Introduction Kidney transplantation is widely accepted as the preferred treatment for the majority of patients with end stage renal disease [11]. Patients

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung POLYTECHNIC UNIVERSITY Department of Computer and Information Science COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung Abstract: Computer simulation of the dynamics of complex

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Seminar on A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Mohammad Iftakher Uddin & Mohammad Mahfuzur Rahman Matrikel Nr: 9003357 Matrikel Nr : 9003358 Masters of

More information

Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks

Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks SaeedA.AldosariandJoséM.F.Moura Electrical and Computer Engineering Department Carnegie Mellon University 5000 Forbes

More information

Practical Design of Experiments: Considerations for Iterative Developmental Testing

Practical Design of Experiments: Considerations for Iterative Developmental Testing Practical Design of Experiments: Considerations for Iterative Developmental Testing Best Practice Authored by: Michael Harman 29 January 2018 The goal of the STAT COE is to assist in developing rigorous,

More information

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network Journal of Innovative Technology and Education, Vol. 3, 216, no. 1, 131-137 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/jite.216.6828 Graph Sampling Approach for Reducing Computational Complexity

More information

Crew Scheduling Problem: A Column Generation Approach Improved by a Genetic Algorithm. Santos and Mateus (2007)

Crew Scheduling Problem: A Column Generation Approach Improved by a Genetic Algorithm. Santos and Mateus (2007) In the name of God Crew Scheduling Problem: A Column Generation Approach Improved by a Genetic Algorithm Spring 2009 Instructor: Dr. Masoud Yaghini Outlines Problem Definition Modeling As A Set Partitioning

More information

Year 9: Long term plan

Year 9: Long term plan Year 9: Long term plan Year 9: Long term plan Unit Hours Powerful procedures 7 Round and round 4 How to become an expert equation solver 6 Why scatter? 6 The construction site 7 Thinking proportionally

More information

Breaking Grain-128 with Dynamic Cube Attacks

Breaking Grain-128 with Dynamic Cube Attacks Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur and Adi Shamir Computer Science department The Weizmann Institute Rehovot 76100, Israel Abstract. We present a new variant of cube attacks called

More information

Atlas: Approximating Shortest Paths in Social Graphs

Atlas: Approximating Shortest Paths in Social Graphs Atlas: Approximating Shortest Paths in Social Graphs Lili Cao, Xiaohan Zhao, Haitao Zheng, and Ben Y. Zhao Computer Science Department, U. C. Santa Barbara Abstract. The search for shortest paths is an

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

7. Decision or classification trees

7. Decision or classification trees 7. Decision or classification trees Next we are going to consider a rather different approach from those presented so far to machine learning that use one of the most common and important data structure,

More information

Spatial Patterns Point Pattern Analysis Geographic Patterns in Areal Data

Spatial Patterns Point Pattern Analysis Geographic Patterns in Areal Data Spatial Patterns We will examine methods that are used to analyze patterns in two sorts of spatial data: Point Pattern Analysis - These methods concern themselves with the location information associated

More information

Middle School Math Course 3

Middle School Math Course 3 Middle School Math Course 3 Correlation of the ALEKS course Middle School Math Course 3 to the Texas Essential Knowledge and Skills (TEKS) for Mathematics Grade 8 (2012) (1) Mathematical process standards.

More information